Book description
IBM® InfoSphere® Guardium® provides the simplest, most robust solution for data security and data privacy by assuring the integrity of trusted information in your data center. InfoSphere Guardium helps you reduce support costs by automating the entire compliance auditing process across heterogeneous environments. InfoSphere Guardium offers a flexible and scalable solution to support varying customer architecture requirements.
This IBM Redbooks® publication provides a guide for deploying the Guardium solutions.
This book also provides a roadmap process for implementing an InfoSphere Guardium solution that is based on years of experience and best practices that were collected from various Guardium experts. We describe planning, installation, configuration, monitoring, and administrating an InfoSphere Guardium environment. We also describe use cases and how InfoSphere Guardium integrates with other IBM products.
The guidance can help you successfully deploy and manage an IBM InfoSphere Guardium system.
This book is intended for the system administrators and support staff who are responsible for deploying or supporting an InfoSphere Guardium environment.
Table of contents
- Front cover
- Notices
- Preface
- Chapter 1. Solutions and architecture
- Chapter 2. Implementation planning
-
Chapter 3. Installation and configuration
- 3.1 Schedule of Implementation activities
- 3.2 Installation and configuration planning
- 3.3 Guardium appliance overview
- 3.4 Database and appliance inventory
- 3.5 Appliance deployment considerations
- 3.6 Appliance installation and configuration
- 3.7 Agent deployment, installation, and configuration
- 3.8 Configure remaining appliances
- 3.9 Guardium operations
- 3.10 Vulnerability assessment
- 3.11 Where to find more help
-
Chapter 4. Monitoring and auditing
- 4.1 Regulations and compliance
- 4.2 Auditing categories
- 4.3 Auditing requirements
- 4.4 Database activity monitoring
- 4.5 Vulnerability assessment
-
4.6 Mapping audit requirements to the solution
- 4.6.1 Requirement 2: Do not use vendor-supplied defaults for system passwords
- 4.6.2 Requirement 3: Protect stored cardholder data
- 4.6.3 Requirement 6: Identify systems missing patches and enforce change controls
- 4.6.4 Requirement 7: Compensating control for network segmentation
- 4.6.5 Requirement 8: Assign a unique ID for each person with a computer access
- 4.6.6 Requirement 10: Track and monitor all access to cardholder data
- 4.6.7 Requirement 11: Regularly test systems
- 4.6.8 SOX requirement: Prevent unauthorized changes to the financial CRM, ERP, and HR data
-
Chapter 5. Monitoring setup
- 5.1 Monitoring setup overview
- 5.2 Monitoring planning
- 5.3 Grouping
- 5.4 Policy
- 5.5 Reports
- 5.6 Compliance workflow
- 5.7 Real-time and threshold alerting
- 5.8 Data level access control
- 5.9 Vulnerability assessment setup
- 5.10 Configuration audit system setup
- 5.11 Entitlement reporting setup
- 5.12 Database auto-discovery setup
- 5.13 Sensitive data finder setup
- 5.14 Adding a menu tab to your portal
- Chapter 6. Access management
- Chapter 7. Ongoing operations
- Chapter 8. Disaster recovery
- Chapter 9. Upgrade best practices
- Chapter 10. Use cases
- Chapter 11. Integration with other IBM products
- Related publications
- Back cover
Product information
- Title: Deployment Guide for InfoSphere Guardium
- Author(s):
- Release date: March 2014
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
CCENT/CCNA ICND1 100-101 Official Cert Guide
The Publisher regrets that the CD/DVD content for this title cannot be made available Online. Cisco …
book
Enhanced Cyber Resilience Threat Detection with IBM FlashSystem Safeguarded Copy and IBM QRadar
The focus of this document is to demonstrate an early threat detection by using IBM® QRadar® …
book
IBM QRadar Version 7.3 Planning and Installation Guide
Abstract With the advances of technology and the reoccurrence of data leaks, cyber security is a …
book
Proactive EarlyThreat Detection and Securing Oracle Database with IBM QRadar, IBM Security Guardium Data Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy
This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM …